Implementations of cryptographic modules, Other Subject

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.

Posted Date: 10/12/2012 8:44:08 AM | Location : United States







Related Discussions:- Implementations of cryptographic modules, Assignment Help, Ask Question on Implementations of cryptographic modules, Get Answer, Expert's Help, Implementations of cryptographic modules Discussions

Write discussion on Implementations of cryptographic modules
Your posts are moderated
Related Questions
INTERNET SECURITY HOLES? Emergence of Cyber Crime Sorry to say, not all of you are using the Internet in an optimistic way. The Internet has not only permitted you to com

Outline the development and progression of reconciliation, Other Subjec

What Is Our Responsibility To Nature? Our responsibility towards nature is to take care of her. Don't throw out waste things out your car windows for other people to pick up, g

Question 1: Explain clearly how Public Policy Making constitutes one of the major tasks which have to be accomplished by modern Governments. Question 2: "Policy Formul

Digital Signatures Digital signatures are based on a grouping of the conventional idea of data hashing with public key-based encryption. Most hash functions are like to encrypt

Car Following Behavior of Driver - Traffic Congestion and Safety on the Road   Understanding car following contributes significantly to an understanding of traffic flow. Car

which syllabus should read for IAS pre and main

Review each of the four components of the revenue cycle (Pre claims, Claims, Accounts Receivable, and Claims, reconciliation and collections) and identify a key staff member involv

what happen to the ukrainians and combodians?

You being a teacher describe your experience regarding the role of family life education..